{"id":23864,"date":"2015-12-09T12:30:11","date_gmt":"2015-12-09T01:30:11","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23864"},"modified":"2015-12-09T12:21:10","modified_gmt":"2015-12-09T01:21:10","slug":"cyber-wrap-100","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-100\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a><\/p>\n Following on from Xi Jinping\u2019s September state visit, Chinese Minister of Public Security Guo Shengkun met with US Secretary of Homeland Security Jeh Johnson, US Attorney General Loretta Lynch<\/a> in Washington last week to discuss bilateral collaboration on cybercrime issues. The talks established guidelines<\/a> around timely information sharing and cooperation on cyber-enabled crimes such as child exploitation, theft of trade secrets and terrorist communications. The US Justice Department has announced<\/a> plans for a Sino-US cyber table-top exercise on cybercrime and network protection in order to enhance mutual understanding of each other\u2019s cyber processes and procedures. A Cold War-era cyber hotline<\/a> will also be established between Xi and Obama to enable better management of cyber incidents. Despite questions about the authenticity<\/a> of China\u2019s new found attitude on cyber collaboration, the value of this partnership will likely become clear between now and the second ministerial meeting planned for June 2016.<\/p>\n However, fingers are being pointed at China after the networks of Australia\u2019s Bureau of Meteorology (BoM) were breached<\/a> last week. BoM is a critical national asset, possessing one of the nation\u2019s largest supercomputers<\/a> and providing vital environmental monitoring such as weather forecast and water supply analyses. The agency is connected<\/a> to multiple high-clearance departments, including Defence, and thus may have been targeted as the \u2018soft point of entry<\/a>\u2019 into more strategic networks. Unsurprisingly, China\u2019s foreign ministry spokeswoman Hua Chunying has denied claims<\/a> that China was behind the breach. Despite the official statement<\/a> from BoM emphasising that its systems remain \u2018fully operational\u2019, it\u2019s suggested that the incident may take years and hundreds of millions of dollars to fix.<\/p>\n On a positive note, the Commonwealth Bank of Australia (CBA) and the University of NSW have announced<\/a> a five-year partnership to address the national shortage of cybersecurity expertise. The $1.6 million deal will go towards a new cybersecurity lab, financial support for PhD students, and the development of an applied cyber engineering degree that teaches students to think like hackers. Ben Heyes, CBA\u2019s chief information security and trust officer, cited<\/a> the growing difficulty of staffing important cybersecurity roles in Australia as a key driver behind the partnership. The new cybersecurity course content will be made available to study for free online in an effort to inspire other universities to adopt a more creative and practical approach to cybersecurity education.<\/p>\n Global hacktivist group Anonymous has released the private details<\/a> of more than 1,400 officials at the UN climate talks in Paris in response to the arrest<\/a> of more than 200 protesters who took to the streets as part of the Global Climate March<\/a>. The March had been banned in Paris, along with all other demonstrations, in wake of recent terrorist attacks in the French capital. The group breached the UN Framework Convention on Climate Change (UNFCCC) website, publishing the names, phone numbers, email addresses, encrypted passwords, answers to secret questions and office addresses of attendees on their website. The hack exploited<\/a> a well-known database vulnerability, SQL injection, and the basic encryption techniques used to protect the information.<\/p>\n Public anxiety over the growing \u2018Internet of Things\u2019 has turned its attention to the vulnerability of networked toys. Cybersecurity researchers have discovered<\/a> a series of fundamental security flaws in the software behind Mattel\u2019s new talking doll, Hello Barbie. The wifi-connected doll, which can hold real-time conversations<\/a> by uploading audio to the cloud in return for an artificial intelligence-generated response, apparently fulfils the dreams of children and hackers alike. The toy\u2019s use of weak authentication mechanisms made it possible for hackers to eavesdrop<\/a> on communication sent to the server, and the servers had also not been patched<\/a> for the infamous POODLE bug<\/a> that undermines secure connections. Those security problems had already been communicated to Mattel, who have since fixed the issues. However, this follows last month\u2019s hack of Hong Kong toy-company<\/a>, Vtech, and the subsequent release of personal details and photos of tens of millions of parents and children. As such, networked toys will probably continue to be viewed with suspicion by the public in the near future.<\/p>\n","protected":false},"excerpt":{"rendered":" Following on from Xi Jinping\u2019s September state visit, Chinese Minister of Public Security Guo Shengkun met with US Secretary of Homeland Security Jeh Johnson, US Attorney General Loretta Lynch in Washington last week to discuss …<\/p>\n","protected":false},"author":390,"featured_media":23867,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,1582,391,728],"class_list":["post-23864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-collaboration","tag-cyber","tag-hacking"],"acf":[],"yoast_head":"\n